Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-31211
HistoryApr 04, 2024 - 11:00 p.m.

CVE-2024-31211 Remote Code Execution in `WP_HTML_Token`

2024-04-0423:00:17
CWE-502
GitHub_M
www.cve.org
wordpress
web publishing
unserialization
code execution
__destruct() method
security vulnerability
patch
versions

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

WordPress is an open publishing platform for the Web. Unserialization of instances of the WP_HTML_Token class allows for code execution via its __destruct() magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.

CNA Affected

[
  {
    "vendor": "WordPress",
    "product": "wordpress-develop",
    "versions": [
      {
        "version": ">= 6.4.0 < 6.4.2",
        "status": "affected"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CVELIST:CVE-2024-31211